DllMain
fltInfo
fltLoad
fltSave
Static task
static1
Behavioral task
behavioral1
Sample
8c32a781c948f8f8f24f08ee5a4d06d0b38a9e7cfda0a5d692b8e5017e67fb82.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c32a781c948f8f8f24f08ee5a4d06d0b38a9e7cfda0a5d692b8e5017e67fb82.dll
Resource
win10v2004-20220901-en
Target
8c32a781c948f8f8f24f08ee5a4d06d0b38a9e7cfda0a5d692b8e5017e67fb82
Size
233KB
MD5
909c9dac18e87c99336d4fa74fcd3019
SHA1
ccb8d590ec4501fc92640deb07aec7b082eef62c
SHA256
8c32a781c948f8f8f24f08ee5a4d06d0b38a9e7cfda0a5d692b8e5017e67fb82
SHA512
af57cd51335ecb8c7a0ae75f215a59025aaf0b7f5f189f0ac9b6b53e5130a312759b635cd03d447c905257f10b5094445c176baacfc04cba7fed154695dffd30
SSDEEP
6144:792ut+g0QPekyswLCwuSr08hKZFXZoMq3g:Z2uh0igTx9nXMOg
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LocalAlloc
LocalFree
LeaveCriticalSection
TerminateProcess
VirtualAlloc
SetFilePointer
SetStdHandle
CloseHandle
FlushFileBuffers
LoadLibraryA
WriteFile
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapFree
HeapAlloc
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
lstrcpyA
ExitProcess
GetOEMCP
GetLastError
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetStdHandle
SetHandleCount
GetFileType
GetStartupInfoA
GetModuleFileNameA
GetCPInfo
GetACP
GetDC
GetTextMetricsA
TextOutA
CreatePalette
ord163
ord116
ord123
ord117
ord129
ord125
ord120
ord192
ord189
ord188
ord191
ord190
DllMain
fltInfo
fltLoad
fltSave
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE